July 20, 2024


Hello all,

It started out as a normal week with a few critical updates, and the normal onslaught of attacks, vulnerability reveals, and good-guy victories. Then Friday came.

If you’ve been on vacation, or oblivious to the news, in the wee hours of Friday morning, CrowdStrike (a US based cybersecurity vendor used by most of the Fortune 500, Governments, and other companies worldwide) released a critical update for their Falcon Security-as-a-Service product. Unfortunately, it appears it was not vetted, as global chaos ensued when 8.5 million Microsoft Windows workstations and servers promptly went into a Blue Screen of Death (BSOD) boot-loop. CrowdStrike fixed the update within 90 minutes of release, but the damage was done. To stop the BSOD the systems must either be restored to a point prior to the update, or the update file needs to be removed. The catch is that few automated methods exist, necessitating systems to be fixed manually, one at a time. More details about this incident, mitigation steps, recovery efforts, fallout, and more are in our various links below.

Read on for additional information regarding CrowdStrike and for other news items from this past week, paying particular attention to any vulnerabilities in products that you have responsibility over.

The volume of news and other can appear overwhelming, the best strategy is to read the Notable Callouts below and then skim the full list of linked news item titles that follow for things that pertain to you or your environment or simply interest you, and then selecting them for more information. So, let’s get to it. And don’t forget, our site, https://red-n-security.com also has searchable archives of past newsletters.

Notable Callouts:

  • Cisco revealed and patched two separate issues this week. The first is in Smart Software Manager (SSM) On-Prem and Satellite. It scored a perfect 10 out of 10 in CVSS and allows an unauthenticated attacker to change passwords. So, if you use this patch immediately! The second is for their Security Email Gateway (SEG) appliances. This one is also critical in that if exploited, it allows the attacker to create new users with root permissions. If that’s done, game over. Patch now.
  • CrowdStrike garnered a number of links in our newsletter this week. This particular link deals with the immediate world-wide impact of so many critical systems BSODing simultaneously. Flights, railways, banks, hospitals, mass-transit systems, retailers, Starbucks (oh no! Coffee!), news broadcasters, government emergency services, and the list goes on, were taken offline or crippled. For companies affected, it was catastrophic. The economic impact will take some time to tally, especially as recovery efforts are still underway.
  • Exim, a mail transfer agent used by 1.5 million servers worldwide has a flaw that allows malicious emails to pass through. Update as soon as you’re able to plug this hole.
  • Google Chrome received an update on Friday, you can be excused if you didn’t notice. But it is a very important one that plugs multiple vulnerabilities, some of which can allow a threat actor Remotely Code Execution (RCE). Check your browser for any updates and restart it after applying them. Expect that other Chromium based browsers will be following suit soon and plan to update them when their patches come out.
  • Juniper continues to fix vulnerabilities; this week it is a bug in Junos OS that enables authenticated attackers to gain root access. While not pants-on-fire, this should be patched as soon as is practical. Threat actors are quite good at chaining vulnerabilities to achieve their evil goals.
  • Microsoft cloud outage causes airlines to ground flights reads the headline. While this is partially correct, the root cause was CrowdStrike Falcon taking down the systems needed for tracking and managing those flights. “Across the globe, 4,983 flights were canceled and another 43,826 were delayed, according to FlightAware data as of 11:30 p.m. Friday evening.” It was a very bad day to be a traveler.
  • SolarWinds has released patches for Access Rights Manager (ARM). There is a rather large list of flaws addressed. They are quite severe, so if you use this, patch now.
  • Splunk has a critical flaw in Splunk Enterprise on Windows that allows passwords to be accessed by threat actors. Mitigation instructions exist, and an update to patch is available as well.

In Ransomware, Malware, and Vulnerabilities News:

  • CrowdStrike is now top-of-mind for many IT professionals. Opportunistic threat actors have jumped onto this like a pack of ravenous hyenas and are offering “automated fixes” to remediate the issue, with software, scripts, and “updates” laced with malware and back-door software. Hundreds of look-alike CrowdStrike domains have been registered by them for phishing campaigns. Be very wary of geeks bearing gifts.
  • 300 arrests made, “The arrests — made across five continents — came as part of Operation Jackal III, Interpol said in a statement, which ran from April 10 to July 3.” Police and authorities were able to seize millions in ill-gotten goods, and cryptocurrency. Yay for the good guys!

In Other News Events of Note and Interest:

  • CrowdStrike’s incident has several links in this section. Descriptions of the issue, suggested remediations, analysis, talks of government regulation, and deeper dives.
  • Parts of Tonga without internet, in a dumbfounding move, officials in the government of Tonga ordered StarLink to prevent service in their island nation until they obtained a license to operate. That was done despite the nation being almost completely cut off from the internet due to several undersea cable cuts. Bureaucracy gone amok if you ask me. If anything called for a temporary exemption, this situation would certainly be it.

In Cyber Insurance News:

  • Insurers face business interruption claims, talks about how the CrowdStrike incident is going to reach into the insurance market to attempt some compensation. Does your policy cover this type of interruption? If you were affected, I pray it did, if you weren’t, now is the time to check and add it if you don’t have it.

My prayers go out to those cyber warriors wading through the morass of remediating the CrowdStrike Falcon disaster. There is a light at the end of the tunnel, it just may take a while to get there, don’t give up. I’ve used the word Incident a few times in this week’s news in connection with the global outage caused by this faulty update. And it truly is an Incident in the technical sense of the word. Which leads to the question, “Does your Incident Response Plan (IRP) cover this type of event?” If not, time to update. While you’re at it, update your Disaster Recovery Plan (DRP) to cover such an Incident. It is vital to know who will do what, before something occurs, so that you are not left scrambling, God-forbid, it happens to you.

Keep the shields up. They really are out to get you, sometimes by accident.

Visc. Jan Broucinek

 

Viscount Jan Broucinek
Red-N Weekly Cyber Security News

 

Headline NEWS

 

Ransomware, Malware, and Vulnerabilities News

 

Other News Events of Note and Interest

 

Cyber Insurance News

 

Share this with: